WebApp Sec mailing list archives
Pentesting attacks
From: ITlook <madziak12 () vp pl>
Date: Wed, 25 Jul 2012 05:00:51 -0700 (PDT)
- Zed Attack Proxy - see what it;s all about! - Understand how A Wireless (802.11) Probe Request Based Attack works - How to secure users from Phishing, Smishing & Social Media Attacks - Cyber war... Is the digital apocalypse approaching? - Original “security through obscurity" viz. SCADA penetration testing Find it now in FREE issue of PenTest magazine! http://pentestmag.com/pentesting-attacks-pentest-free/ -- View this message in context: http://old.nabble.com/Pentesting-attacks-tp34209974p34209974.html Sent from the Web App Security mailing list archive at Nabble.com. This list is sponsored by Cenzic -------------------------------------- Let Us Hack You. Before Hackers Do! It's Finally Here - The Cenzic Website HealthCheck. FREE. Request Yours Now! http://www.cenzic.com/2009HClaunch_Securityfocus --------------------------------------
Current thread:
- Pentesting attacks ITlook (Jul 25)